Surprise
Internet
Cybersecurity
Functions
Data
100

What binary number has the greatest decimal value 011111, 100000, or 100001?

100001

100

What is the term used to describe a unique identifier assigned to each device connected to the internet?

What is an IP address?

100

This type of malicious software that requires user interaction to replicate itself and infecting other files and systems.

What is a virus?

100

What is the term for a named block of code that performs a specific task and can be called or invoked multiple times throughout a program?

What is a function?


100

 What is the term for large and complex datasets?

What is big data?

200

How many bits are needed to represent the decimal 42 in binary? 

6

200

What protocol is used to translate domain names into IP addresses?

What is the Domain Name System (DNS)?

200

What is the term for a technique where an attacker pretends to be a trustworthy entity to deceive individuals and obtain sensitive information, such as usernames, passwords, or credit card details?

What is phishing?

200

 What are parameters in a function?

What are variables declared in the function's definition and used to pass values into the function?

200

What is the term for the practice of obtaining input, information, or contributions from a large group of people, typically through an online platform or community, to accomplish a task or solve a problem?

 What is crowdsourcing?

300

What is the decimal value of 101011111?

351
300

This networking protocol ensures reliable and ordered delivery of data packets over a network. Name the protocol.

What is the Transmission Control Protocol(TCP)?

300

This type of malicious software is capable of spreading autonomously across networks and the internet without the need for user interaction, often exploiting security vulnerabilities.

What is a Worm?

300

What is the difference between a function declaration and a function call?

What is a function declaration defines the function, while a function call executes it?

300

What is the process of cleaning, transforming, and preparing raw data to ensure its accuracy, consistency, and suitability for analysis?

What is data preprocessing?

400

What is the decimal number 108 in binary?

1101100

400

Name the system of interlinked hypertext documents that is accessed through the internet.

What is the World Wide Web?

400

This type of encryption uses the same key for both encryption and decryption. 

What is symmetric encryption?

400

What is the purpose of using functions in programming?

What is code organization, reusability, and modularity?

400

What is the practice of representing data in a visual or graphical format to facilitate understanding, exploration, and communication of insights?

What is data visualization?

500

What is decimal number 1070 in binary?

10000101110

500

What organization is responsible for assigning and managing IP addresses and domain names globally?

What is the Internet Corporation for Assigned Names and Numbers (ICANN)?

500

This type of phishing attack targets high-profile individuals such as executives or key personnel, with the goal of stealing sensitive information or gaining unauthorized access to systems. What is it?

What is Whaling?

500

What is a function that does not return a value?

What is a void function?

500

 What is the term for the technique used to transform data in such a way that it remains usable for analysis while protecting the privacy and confidentiality of individuals?

What is data anonymization or de-identification?

M
e
n
u